Lucene search

K
symantecSymantec Security ResponseSMNTC-110724
HistoryOct 28, 2019 - 12:00 a.m.

Fortinet FortiExtender CVE-2019-15710 OS Command Injection Vulnerability

2019-10-2800:00:00
Symantec Security Response
www.symantec.com
16

0.002 Low

EPSS

Percentile

53.1%

Description

Fortinet FortiExtender is prone to an OS command-injection vulnerability because it fails to properly sanitize user-supplied input. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Fortinet FortiExtender versions prior to 4.0.1 and 4.1.2 are vulnerable.

Technologies Affected

  • Fortinet FortiExtender 1.0.0
  • Fortinet FortiExtender 2.0.0
  • Fortinet FortiExtender 3.0.0
  • Fortinet FortiExtender 3.1.0
  • Fortinet FortiExtender 3.2.0
  • Fortinet FortiExtender 3.3.0
  • Fortinet FortiExtender 4.0.0
  • Fortinet FortiExtender 4.1.0
  • Fortinet FortiExtender 4.1.1

Recommendations

Block external access at the network boundary, unless external parties require service.
If possible, block external access to the server hosting the vulnerable software. Permit access for trusted or internal networks and computers only.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit this and similar vulnerabilities. Audit all applicable logs regularly

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, run all server processes with the minimal amount of privileges required for functionality.

Updates are available. Please see the references or vendor advisory for more information.

0.002 Low

EPSS

Percentile

53.1%

Related for SMNTC-110724